هدف البحث الى بيان طبيعة ارتباط والتأثير بين الضغوط التنافسية (المتغير المستقل) والتجديد الاستراتيجي (المتغير التابع) ، تم تطبيق البحث في فنادق الدرجة الممتازة في بغداد. وبلغت عدد افراد عينة البحث (99) مديراً يعملون في (6) فنادق من الدرجة (الممتازة) ببغداد، وهي (فندق الرشيد، فندق عشتار، فندق ميريديان، فندق المنصور، فندق بابل، وفندق بغداد) وتم اجراء التحليل الاحصائي باستخدام البرنامج الاحصائي AMOS وظهرت وجود تنافسية عالية بشأن الخدمة التي تقدمها الفنادق من وجهة نظر المبحوثين ، وهناك ارتباط وتأثير للضغوط تنافسية في التجديد الاستراتيجي ، وان يولي المديرين اهتماماً استثنائياً بموضوعات (الضغوط التنافسية والتجديد الاستراتيجي) وينبغي تضمينها في توجهاتهم الاستراتيجية ، و وكانت الاستبانة هي الاداة الرئيسة لجمع البيانات من المستجيبين، توصل البحث الى عدد من النتائج ، من ابرز النتائج وجود علاقة ارتباط ذات دلالة احصائية معنوية بين الضغوط التنافسية والتجديد الاستراتيجي ، فضلا عن وجود تأثير للضغوط التنافسية في التجديد الاستراتيجي على المستوى الكلي وعلى مستوى الابعاد الفرعية
Eprospective study undertaken between January 2007 and January 2011, 58 consecutive cases with compound tibial shaft fractures. All fractures were stabilized by external fixator device AO/ASIF type after failed the manipulation under anesthesia (MUA) to restore the osseous alignment. In 32 patients cancellous bone graft were used from the upper part of the tibia to enhance healing process, all these patients were followed for an average of 8–12 months. Our findings showed that stabilization of the fracture shaft tibia by external fixation with cancellous bone graft had significantly better result, than external fixation alone. We conclude that unilateral, uniplanar external fixation with early bone grafting from upper part of the tibia is
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
The Present research aimed at identifying:
1- The level of environmental stress among preparatory students
2- The level of self-rebellion among preparatory students
3- The correlation between the two variables of research (environmental stress and self-rebellion) and the extent to which the independent variable contributes to the variable of the middle school students.
The current research has determined the students of the fifth stage of the preparatory stage and all the branches in the departments of education in Baghdad province the morning study for the academic
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show MoreThe current study was designed to explore the association between the pigments production and biofilm construction in local Pseudomonas aeruginosa isolates. Out of 143 patients suffering from burns, urinary tract infections (UTI), respiratory tract infections and cystic fibrosis obtained from previous study by Mahmood (2015), twenty two isolates (15.38%) were identified from (11) hospitals in Iraq, splitted into three provinces, Baghdad, Al-Anbar and Karbala for the duration of June 2017 to April 2018. Characterization was carried out by using microscopical, morphological and biochemical methods which showed that all these isolates belong to P. aeruginosa. Screening of biofilm production isolates was carried out by usi
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreAbstract
The current research aims to identify the level of E-learning among middle school students, the level of academic passion among middle school students, and the correlation between e-learning and academic passion among middle school students. In order to achieve the objectives of the research, the researcher developed two questionnaires to measure the variables of the study (e-learning and study passion) among students, these two tools were applied to the research sample, which was (380) male and female students in the first and second intermediate classes. The research concluded that there is a relationship between e-learning and academic passion among students.